Privacy preservation models for third-party auditor over cloud computing: A survey
Cloud computing has become a prominent technology due to its important utility service; this
service concentrates on outsourcing data to organizations and individual consumers. Cloud …
service concentrates on outsourcing data to organizations and individual consumers. Cloud …
A systematic review on WebRTC for potential applications and challenges beyond audio video streaming
Video conferencing and live streaming are being used in various industries, such as
healthcare, gaming, telecommunication, manufacturing and others. As technology …
healthcare, gaming, telecommunication, manufacturing and others. As technology …
Performance comparison of a webrtc server on docker versus virtual machine
CC Spoiala, A Calinciuc, CO Turcu… - … on Development and …, 2016 - ieeexplore.ieee.org
Current developments in real-time technologies enable multiple companies to focus on a
standard in order to bring real-time technologies to the web. The efforts lead to the API …
standard in order to bring real-time technologies to the web. The efforts lead to the API …
Analysis of video quality and end-to-end latency in WebRTC
B Garcia, L Lopez-Fernandez… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
WebRTC is a set of emerging technologies that extends the web browsing model to
exchange real-time media with other browsers. Despite the fact that WebRTC is still in under …
exchange real-time media with other browsers. Despite the fact that WebRTC is still in under …
Network as-a-service: The WebRTC case: How SDN & NFV set a solid Telco-OTT groundwork
In this paper, we consider networking technologies like Software-Defined Networks (SDN)
and Network Functions Virtualization (NFV) to analyze, as a first step, the opportunities that …
and Network Functions Virtualization (NFV) to analyze, as a first step, the opportunities that …
TrustCall: A trust computation model for Web conversational services
Web conversational services are exposed to several threats in which the social context
between communicating participants is manipulated. Cybercrimes based on identity …
between communicating participants is manipulated. Cybercrimes based on identity …
Smart recommendation of mobile services to consumers
This paper describes the design and implementation of a smart recommendation system
used to discover and suggest to consumers thebest'mobile services in the emerging …
used to discover and suggest to consumers thebest'mobile services in the emerging …
WebRTC security measures and weaknesses
WebRTC is a technology that enables real-time communication between web browsers for
information streaming, including text, sound or direct data transfer. WebRTC is supported by …
information streaming, including text, sound or direct data transfer. WebRTC is supported by …
Unified communications as a service and WebRTC: An identity-centric perspective
Abstract Software-as-a-service (SaaS) is gaining momentum for all business applications,
including Unified Communications as a Service (UCaaS). In this context, user identity will …
including Unified Communications as a Service (UCaaS). In this context, user identity will …
NUBOMEDIA: an elastic PaaS enabling the convergence of real-time and big data multimedia
The increasing acceptance of Network Function Virtualization (NFV) and Software Defined
Networks (SDN) paradigms is enabling the creation of cloud technologies combining Real …
Networks (SDN) paradigms is enabling the creation of cloud technologies combining Real …